Mitigating security risks and ensuring business continuity at the network’s edge
- Details
- Published: Thursday, 28 January 2016 08:57
Organizations can focus on some key mitigation priorities to secure the network’s edge more effectively. Kent Woodruff explains…
Businesses that operate across a variety of locations will often face challenges in maintaining network security. These companies are also at a higher risk of suffering data breaches and service disruptions. In order to ensure business continuity and mitigate risks, the highly vulnerable ‘network’s edge,’ which is often viewed as a soft target, must be carefully protected against threats and malicious attacks.
According to Gartner, by 2016 thirty percent of advanced targeted threats will specifically focus on distributed locations as the entry point (1). A range of factors contribute to security weaknesses in distributed networks, but they can be heightened by issues such as limited onsite IT support, lack of employee security awareness, and the dangers associated with third parties and customers accessing the network. Despite the risks, organizations can focus on some key mitigation priorities to secure the network’s edge more effectively.
Visibility
Ensuring device visibility is the key to any security strategy. With many new devices joining enterprise networks, visibility into mobile networks is becoming critical. Network administrators need the ability to identify, track, and categorise all devices accessing the network. Device visibility provides IT with real-time inventory and security intelligence for active remediation while allowing users to seamlessly connect to the network without disruptions or changes in end-user experience.
Discipline
A disciplined approach to security at the network’s edge can play a major role: regular audits should be conducted to maintain up-to-date and accurate network topologies (logical and physical). Use a common set of security controls for policy management, and institute governance, risk, and compliance security best practices. Strong collaboration and communication across teams within the IT organization is also key to creating a reliable and uniform approach.
Security protocols
These human factors are very important: it is imperative for enterprises to teach and enforce employee security protocols. In particular, employees should be trained to recognise and report phishing emails: they should be able to spot the common signs of suspicious communication, such as encouragement to click on links, especially examples that are unfamiliar or do not match the supposed source’s web address. Urgent requests to provide information, call a phone number, or download attachments are also a danger sign, along with bad spelling or unusual grammar.
Beyond organizational and strategic efforts to improve security, specific policies, such as controlling entry points to routers and correctly configuring network firewalls are a vital steps in minimising the risks of a security breach.
BYOD
With the explosion of ‘bring your own device’ (BYOD) and mobility, there are more network access points than ever before. Organizations should also create segmented safety zones and implement parallel networking to deliver extra layers of security.
Network segmentation
Network segmentation allows for the partitioning of the network into ‘security zones,’ or segments separated by firewalls. Properly configured segments separate applications and prevent access to sensitive data. A point-of-sale system, for example, should operate on a segment separate from third party applications, employee email, or public WiFi. This limits the ability of attackers to pivot from one application to another, and allows network administrators to manage the quality of service (QoS) on specific segments, prioritising bandwidth usage for mission critical applications.
In contrast to segmenting a single network, creating multiple parallel networks is a relatively simple solution. Separate applications are assigned completely separate networks, or ‘air-gapped’. This physical separation of data further prohibits attackers from using a compromised device to pivot to other servers and networks, including those that hold sensitive data.
Based on information collected by Verizon (2), a global network carrier, for the 2015 Data Breach Investigations Report, 23 percent of recipients now open phishing messages and 11 percent click on attachments. This allows attackers onto the network, set up camp and continue to work to find vulnerabilities. Because of this, enterprises should consider hosting customer WiFi, employee devices, and point-of-sale systems on their own respective networks.
Enterprises should also expect third parties such as vendors, partners and kiosks who require Internet access to ‘bring your own network’. By expecting third parties to provide their own parallel networks, the company can retain governance over its own network functions, while reducing the overall scope of work to maintain network security.
Parallel networks
Parallel networks significantly reduce the amount of time and expertise needed to segment networks based on application, and limit the scope of work for maintaining PCI compliance on the network used for transmitting cardholder data.
Ensuring business continuity
Enterprises with distributed locations or branch offices are at the highest risk of suffering data breaches, but the primary focus is often placed on securing central systems rather than vulnerabilities at the edge. An approach, which focuses on specific initiatives to protect the network’s edge, can help organizations stay out of the headlines in the fight against serious and ongoing security risk.
References
- Gartner, ‘Bring Branch Office Network Security Up to the Enterprise Standard’
- http://www.verizonenterprise.com/DBIR/2015/